The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Has good application scanning that it stable and has helpful technical support
Pros and Cons
- "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
- "In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."
What is our primary use case?
How has it helped my organization?
It prevents you from visiting phishing sites. It will scan the URL and let you know whether or not it's a malicious location or not.
It helps to reduce the person from just clicking away.
Users always feel disconnected from the network when they are using their mobile phone and we felt the need to be protected, just as much as our laptops. Sometimes you can click on something without realizing it. Having that extra added layer of security and support helps to keep the person safe from malicious actors.
We were looking for a solution with application scanning, phishing detection, and has the ability to whitelist and blacklist websites or a URL.
What is most valuable?
I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.
It does an active scan of all applications.
Time and time again, you read that applications have been removed from the Play Store because they are from a malicious vendor or they have been compromised. Having an extra layer of security where it scans to ensure that your device has a more secure and stable version of the application is very valuable.
What needs improvement?
In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it. That would be very valuable.
Buyer's Guide
Check Point Harmony Mobile
August 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this product for more than two years.
What do I think about the stability of the solution?
It's a stable solution and I don't recall any outages or access issues. The uptime is high.
What do I think about the scalability of the solution?
Currently, we have not exhausted our license, and haven't had the need to scale it up or down.
We have approximately 800 users who range from customer service to the CEO. Once you have a mobile device, it will be managed.
I am a security analyst and my manager and I are the only two interacting with the solution. We reach out to Check Point for any maintenance that is needed.
How are customer service and support?
Technical support was very helpful and not difficult to connect with them. As soon as we sent them the email, there we always ready and available to arrange a meeting to get things done.
The process is the same before and after deployment. Just sent an email with the issues and they will contact to arrange a meeting to resolve the issue.
I would say that they are very helpful and always just an email away.
How was the initial setup?
The initial setup is straightforward. It's an easy setup with just a flip of a switch.
We were set up and ready to go very quickly. Because it's a cloud offering and hosted online, it's made to be much quicker.
The deployment was less than a week. We installed it manually on the devices then integrated with an MDM that automates the process for all manual devices.
What about the implementation team?
We had support from Check Point to assist us and they were very helpful.
What was our ROI?
The fact that we have not had any mobile breaches is a return on investment.
What's my experience with pricing, setup cost, and licensing?
Check Point pricing is better than Symantec.
Which other solutions did I evaluate?
We also evaluated Symantec Endpoint protection Mobile.
Symantec does not do everything that Check Point does and furthermore, Check Point pricing is better. Budgetary-wise, it was the right choice for us.
What other advice do I have?
This solution checks so many of our boxes already, anything new added would just be the icing on the cake.
My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out.
Don't purchase more licenses than you need because it will become costly.
Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Cyber Security Consultant at Wirespeed
Works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use
Pros and Cons
- "I would rate the stability a ten out of ten."
- "While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."
What is our primary use case?
Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).
What needs improvement?
While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful. Also, the ability to see licenses per mobile device would be handy.
So, in future releases, the ability to see the environment and licensing per device would be good.
For how long have I used the solution?
I have been working with this solution for three years. It's the best solution I have at the moment.
What do I think about the stability of the solution?
I would rate the stability a ten out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. I would rate the scalability a ten out of ten. We have enterprise-level customers.
How are customer service and support?
The solution doesn't require much support.
How was the initial setup?
I would rate my experience with the initial setup a ten out of ten, where one is difficult and ten is easy.
The management console is on the cloud. The deployment takes around five to ten minutes.
What about the implementation team?
For the deployment process, you basically create your account in the Harmony Mobile portal (Infiniti Portal on Check Point).
Then, you configure the user and send them an email containing a QR code for app installation instructions. They download the app from the App Store or Play Store, scan the code, and it configures itself, appearing on the cloud portal. Very quick.
What's my experience with pricing, setup cost, and licensing?
The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down.
What other advice do I have?
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application.
On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution.
Overall, I would rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Mobile
August 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
A good choice for a phishing and malware-free mobile
What is our primary use case?
If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.
What is most valuable?
The feature I find the most valuable is the confirmation of all the apps on your mobile, which is clean.
What needs improvement?
In Harmony Mobile mobile, there is a part for network protection and it actually affects some Messenger apps. For example, in the LINE app, you can receive important messages from friends if you turn on the option in the default settings.
For how long have I used the solution?
I have been using Harmony Mobile for about two years.
What do I think about the stability of the solution?
The solution is stable. I have not had any downtime while using it. The management server only controls the policy changes, so even if the management is down, the app works.
What do I think about the scalability of the solution?
It is a scalable solution.
How are customer service and support?
The technical support is great. I would give it an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was quite easy for me. It was deployed within one day.
What's my experience with pricing, setup cost, and licensing?
I think that the pricing is neither cheap nor expensive. I would say it's average.
What other advice do I have?
Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementor
Engineer at Caldoo
Good integration, great scalability, and helpful technical support
Pros and Cons
- "We've found that the product is quite stable."
- "From a user's perspective, of course, it is always better when it is cheaper in price."
What is our primary use case?
We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.
What is most valuable?
What I like is that the user experience of your mobile device is not compromised by SandBlast Mobile. The end-user doesn't see anything like an extra app on your device. The app is working in the background, scanning for all kinds of cyberattacks, and seeking out phishing, malware, bots, et cetera.
Once something is detected, the end-user gets an alert, and can immediately command an action. When they go to open, let's say, a phishing e-mail, they get an alert that says something to the effect of "Beware, this is a phishing mail. Don't open it." The user has the possibility then to open it, however, it would be quite foolish to do so when they are told not to do it. The app gives you very good warnings in terms of malicious attacks.
There is good integration with mobile device management systems.
There is a potential for reporting if you need it.
The solution scales very well.
We've found that the product is quite stable.
Technical support is helpful.
What needs improvement?
From my perspective, it's a very good product. I can't recall a moment where I thought a feature was missing.
It would be ideal if, one day, this product was bundled into a larger offering so that it's not just a standalone product.
For how long have I used the solution?
I've been using the solution for three years at this point. It's not so long.
What do I think about the stability of the solution?
The stability is okay. We haven't had any issues with bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
In terms of scalability, you can use it very well within an organization. YOu can use it with five devices or a hundred thousand devices. Worldwide, it's used by millions of devices. The scalability potential, therefore, is huge. It's no problem at all if an organization needs to scale it.
How are customer service and technical support?
Technical support is very good. They are very quick as well. It's fairly easy to talk with them when needed, however, truthfully, you don't need regularly. It works very well as a product. You rarely need to deal with technical support.
What's my experience with pricing, setup cost, and licensing?
From a user's perspective, of course, it is always better when it is cheaper in price. That said, it is a fair price. it's not overly expensive. We find it very reasonable. After all, when you get hit with ransomware or some other malicious program, it can be extremely expensive and comes at a great cost to the company.
What other advice do I have?
We're both a reseller as well as an end-user of the solution. We're partners with Check Point.
The product is in the SaaS environment.
I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it.
I'd rate the solution nine out of ten.
However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good.
When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Technology consultant at a tech services company with 501-1,000 employees
Has good visibility, we can see every installed app and the severity and risk of each app
Pros and Cons
- "First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk."
- "Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."
What is our primary use case?
Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.
How has it helped my organization?
We have deployed for the first time a mobile protection solution in the environment & Check Point SandBlast Mobile worked well. All mobile devices that are connected to the network are monitored and restricted for web surfing as per company policy. With that, users also have the flexibility to use their favorite websites for some time. Device compliance, phishing protection, and all other next-gen features in action were previously not there with the environment. Also, adding a new user is very easy, there is no extra load on the team.
What is most valuable?
First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile is good. We can see each & every installed app & information for each app about severity & risk.
URL filtering has a wide variety of URL categories to choose from. We can also add whitelist & blacklist domains as per our requirements.
Another great thing about Check Point SandBlast Mobile is the ease of deployment. We can deploy a solution in an hour or two.
Check Point SandBlast Mobile android application is very easy and simple. The interface & all processes are automated.
What needs improvement?
When adding users sometimes we were not able to send SMS to users also even after the application user was not visible in the dashboard. Upon troubleshooting, we found that the same user has previously integrated with our old Check Point SandBlast Mobile.
Also, we found configuring device groups & mapping policies is quite confusing. There should be a simpler interface.
Other than this, we did not have any problem as of now. In case of any problem, Check Point tech is always available to help.
For how long have I used the solution?
I have been using Check Point SandBlast Mobile for one year.
What do I think about the stability of the solution?
The product is pretty stable, we have not had any problems with stability.
How are customer service and technical support?
Our experience with Check Point tech is very good as of now. Every time we get a solution to our problem. They have been one of our best tech experiences.
How was the initial setup?
The initial setup is very simple & less time-consuming.
What about the implementation team?
The in-house team implemented the solution.
What's my experience with pricing, setup cost, and licensing?
I was one who implemented the solution & we were not involved with commercials.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Engineer at Spacertron
Offers good filtering, interface configuration, and threat management
Pros and Cons
- "The most valuable features of this solution are the filtering, interface configuration, and threat management."
- "In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical."
What is most valuable?
The most valuable features of this solution are the:
- Filtering
- Interface configuration
- Threat management.
What needs improvement?
In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical.
For how long have I used the solution?
I have been using Check Point SandBlast Mobile for five years.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and technical support?
Their technical support is okay. We haven't had any issues with them.
How was the initial setup?
I would say that the setup was fairly good enough.
What's my experience with pricing, setup cost, and licensing?
Check Point has a very high price for certain mid-size installations and some of their competitors have much lower prices. I would say that for big installations Check Point is okay for pricing but for a small-medium installation it's too expensive. Pricing is something else that they could improve.
What other advice do I have?
I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface.
In the next release, I would like for there to be better integration with other products.
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Security Engineer at DGIT
Excellent anti-phishing and scanning for suspicious SMS with an easy initial setup
Pros and Cons
- "The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links."
- "For SandBlast Mobile, the only thing that is lacking is that it wasn't available for all types of users. However, Check Point has since fixed this, with ZoneAlarm."
What is our primary use case?
We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads.
For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.
What is most valuable?
The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links.
What needs improvement?
For SandBlast Mobile, the only thing that is lacking is that it wasn't available for all types of users. However, Check Point has since fixed this, with ZoneAlarm. With ZoneAlarm for mobile, it will also direct from the Google Apps, or the Play Store. And then they get to pay for it too. I think it's a very nice solution.
In terms of features, I believe they really have everything covered. I can't say if anything needs to be added. In this part of the world, we're still trying to bring ourselves up to speed in terms of what works best.
For how long have I used the solution?
I've been using the solution for three years now.
What do I think about the stability of the solution?
The stability is very good. I'd rate it four out of five. I'm not sure if there are any shortfalls. I haven't seen any that would make me worry about the stability.
What do I think about the scalability of the solution?
The scalability of the solution is good. I'd rate the solution four out of five.
How are customer service and technical support?
We've contacted technical support They've been very good. So far, we've been pleased with their level of service.
Which solution did I use previously and why did I switch?
We didn't previously use a different solution. In terms of mobile technology, it's completely new to me.
How was the initial setup?
The initial setup is pretty straightforward. It's easy to deploy.
Which other solutions did I evaluate?
I haven't evaluated other options of compared this solution to other available platforms.
What other advice do I have?
We're a distributor of Check Point and Check Point partners.
We have a good understanding of what kind of security our clients need to stay safe in our country.
We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone.
I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices.
I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.
Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
It's easy to use and durable but the interface should be more user-friendly
Pros and Cons
- "The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
- "The interface could be more user-friendly. They should improve the look and feel."
What is our primary use case?
We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.
What is most valuable?
The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle.
What needs improvement?
The interface could be more user-friendly. They should improve the look and feel.
I would like to see more meaningful logs in the next release. The way the system is now, it's pretty expensive.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
I've not had an issue with this solution. There were issues when we did it first, there were a few problems with instability. People were not able to log in. But I think it's fine now because now, from a products point of view, it was the best solution.
What do I think about the scalability of the solution?
I'm okay with the scalability. It's flexible enough. I currently have around 400 users. The users are primarily branch managers and top management of the bank.
We don't have any plans to increase the usage as of now.
How are customer service and technical support?
Their technical support is good. We don't have any issues with them. Anytime we have a problem, they help us.
How was the initial setup?
The deployment took around three months.
What about the implementation team?
We used an integrator for the deployment. We used our partners for the integration and customization.
What other advice do I have?
We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer.
I would rate it a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.

Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Mobile Threat DefensePopular Comparisons
McAfee MVISION Mobile
Symantec Endpoint Protection Mobile
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.